Conceptronic 150N Wireless LAN Broadband Router User’s Manual Version: 3.
Contents Chapter I: Introduction 1-1. 1-2. 1-3. 1-4. Product Features Safety information Package contents Familiar with your new wireless broadband router 1-4-1. Front panel 1-4-2. Back panel Chapter II: System and network setup 2-1. 2-2. Build network connection Connecting to wireless broadband router by web browser 2-2-1. Windows XP IP address setup: 2-2-2. Windows Vista IP address setup: 2-2-3. Router IP address lookup 2-2-4.
Chapter IV: Configuration – Wireless 4-1. Wireless - Basic 4-2. 4-3. 4-4. Wireless - Security 4-2-1. WEP 4-2-2. WPA-PSK (Personal) 4-2-3. WPA2-PSK (Personal) 4-2-4. Mixed WPA-PSK / WPA2-PSK (Personal) 4-2-5. WPA (Enterprise) 4-2-6. WPA2 (Enterprise) 4-2-7. Mixed WPA / WPA2 (Enterprise) 4-2-8. 802.1x Wireless - Advanced Wireless - WPS 4-5. 4-6. Wireless - WDS Wireless - Access Control Chapter V: Configuration – Advanced 5-1. 5-2. 5-3. 5-4.
Chapter VI: Configuration – Tools 6-1. Tools - Admin 6-2. 6-3. 6-4. 6-5. 6-6. Tools - Time Settings Tools - Backup / Restore Tools - Upgrade Tools - Restore to Factory Tools - Reboot Chapter VII: Configuration – Status 7-1. 7-2. Status - DHCP Client Status - Wireless Client 7-3. 7-4. 7-5. Status - Traffic Statistic Status - Routing Table Status - Log Chapter VIII: Appendix 8-1. 8-2. 8-3.
Chapter I: Introduction Thank you for purchasing the Conceptronic C150BRS4 Wireless Broadband Router! The Conceptronic C150BRS4 utilizes advanced MIMO technology and increases over 8 times transmission range of ordinary 802.11g products. Compatible with IEEE802.11n (Draft 4.0) and IEEE802.11g/b standards, it can provide up to 150Mbps stable transmission rate.
1-1. Product Features Includes router, wireless access point, four-port switch and firewall in one Provides up to 150Mbps uploading and downloading speed Supports two WPS (Wi-Fi Protected Setup) encryption methods: PBC and PIN Compliant to IEEE802.11n, IEEE802.11g, IEEE802.11b, IEEE802.3 and IEEE802.
1-2. Safety information In order to keep the safety of users and your properties, please follow the following safety instructions: This router is designed for indoor use only; DO NOT place this router outdoor. DO NOT put this router at or near hot or humid places, like kitchen or bathroom. Also, do not left this router in the car in summer. DO NOT pull any connected cable with force; disconnect it from the router first.
1-4. Familiar with your new wireless broadband router 1-4-1.
1-4-2.
Chapter II: System and network setup 2-1. Build network connection Please follow the following instruction to build the network connection between your new WIRELESS router and your computers, network devices: A. Connect your xDSL / cable modem to the WAN port of router by Ethernet cable. B. Connect all your computers, network devices (network-enabled consumer devices other than computers, like game console, or switch / hub) to the LAN port of the router. C.
2-2-1. Windows XP IP address setup: A. Click „Start‟ button (it should be located at lower-left corner of your computer), then click control panel. Double-click Network and Internet Connections icon, click Network Connections, then double-click Local Area Connection, Local Area Connection Status window will appear, and then click „Properties‟ B. Select „Obtain an IP address automatically‟ and „Obtain DNS server address automatically‟, then click „OK‟.
2-2-2. Windows Vista IP address setup: A. Click „Start‟ button (it should be located at lower-left corner of your computer), then click control panel. Click View Network Status and Tasks, and then click Manage Network Connections. Right-click Local Area Network, then select ‘Properties’. Local Area Connection Properties window will appear, select „Internet Protocol Version 4 (TCP / IPv4)‟, and then click „Properties‟. B.
2-2-3.
Input „ipconfig‟, then press „Enter‟ key. Please check the IP address followed by „Default Gateway‟ (In this example, the IP address of router is 192.168.0.1, please note that this value may be different.) Note: If the IP address of Gateway is not displayed, or the address followed by „IP Address‟ begins with „169‟, please recheck network connection between your computer and router, and / or go to the beginning of this chapter, to recheck every step of network setup procedure. 2-2-4.
When the user name and password are correct the wireless router will show the main page with the status of the wireless router: On the main page, you can see the status of the internet connection, the system status, firmware version and activated services. Note: By default, the wireless router is configured to work with Dynamic IP addresses provided by the internet provider. This is a common used setting, making the wireless router to work out of the box in most cases.
Chapter III: Configuration - Home 3-1. Home - Wizard You can setup the wireless router through the built-in Wizard. This Wizard will help you configuring the basic settings of the wireless router step by step. Note: Before starting the Wizard, make sure you have all information about your internet connection available. For example: connection type, account information, etc.
E. For system management purpose, a correct time setting is critical to have accurate time stamps on the system logs. Set an appropriate Time Zone in this step. When completed, click “Next”. F. Select the Internet Connection method which corresponds with your provider settings. If you don‟t know which option you need for your internet connection, please check the documentation of your provider or contact your provider helpdesk. When completed, click “Next”. Connection - Static IP G.
Connection – Dynamic IP H. When your provider requires a Dynamic IP connection, select the “Dynamic IP” option. Some providers require a specific Hostname for their connections. If your provider requires a specific Hostname, enter the Host Name in the field. Some providers only allow 1 specific MAC address to connect to the internet. If your PC Network Card works with the specific required MAC address, press the “Clone MAC Address” button or enter the MAC Address manually. When completed, click “Next”.
Connection - PPTP J. When your provider requires a PPTP connection, select the “PPTP” option. Enter the requested information: Server IP PPTP Account PPTP Password Retype Password When completed, click “Next”. Connection – L2TP K. When your provider requires a L2TP connection, select the “L2TP” option. Enter the requested information: Server IP L2TP Account L2TP Password Retype Password When completed, click “Next”.
You can secure your Wireless Connection with encryption. By default, the wireless router is secured with WPA-PSK/WPA2-PSK Mixed Mode encryption. The predefined encryption key can be found on the bottom of the router. Note: All security options of the Setup Wizard are explained, but it is advised to secure your network with “Mixed WPA-PSK/WPA2-PSK” security if your Clients do not support WPS. This is the highest WPA2 security level, with backwards compatibility to WPA only clients.
P. When all Wireless settings are made, click “Next” to continue. Q. The Setup Wizard is now complete. If you want to apply your settings, click “Save & Take Effect”. If you want to change any setting, click “Back” to return to the previous screen. If you want to close the Setup Wizard without any changes, click “Exit”. When you select “Save & Take Effect”, the router will apply the configured settings and reboot. Please wait for the message “Setup Wizard configuration is complete”. R.
3-2. Home - WAN In this screen, select one mode of your Internet connection you use. If you are not clear, press the “Detect” button or contact your Internet Service Provider, and click “Next”. 3-2-1. ADSL Virtual Dial-up (Via PPPoE) Enter the Account and Password provided by your ISP, and click “Next”.
3-2-2. Dynamic IP (Via DHCP) If your connection mode is Dynamic IP, it means your IP address keeps changing every time you connect. You do not need to enter the information like other modes. Click “Next” and “Save” to finish the settings. 3-2-3. Static IP In this screen, fill the network address information from your ISP in the IP Address, Subnet Mask, Gateway and Primary DNS server fields and click “Next”. Click “Save” to complete the setup wizard. The Router will record the settings you made.
3-2-4. L2TP L2TP Server IP : Enter the Server IP provided by your ISP. User Name : Enter L2TP username. Password : Enter L2TP password. MTU : Maximum Transmission Unit, you may need to change it for optimal performance with your specific ISP. 1400 is the default MTU. Address Mode : Select “Static” if your ISP supplies you with the IP address, subnet mask, and gateway. In most cases, select Dynamic. IP Address : Enter the L2TP IP address supplied by your ISP.
3-2-5. PPTP PPTP Server IP : Enter the Server IP provided by your ISP. User Name : Enter PPTP username provided by your ISP. Password : Enter PPTP password provided by your ISP. Address Mode : Select “Static” if your ISP supplies you with the IP address, subnet mask, and gateway. In most cases, select Dynamic. IP Address : Enter the PPTP IP address supplied by your ISP. Subnet Mask : Enter the Subnet Mask supplied by your ISP. Default Gateway : Enter the Default Gateway supplied by your ISP.
3-3.
3-3-1. WAN Medium In most cases, ISP provides wired WAN access (ADSL MODEM, Cable MODEM, etc.) and you only need to insert the line into the Router‟s WAN port. Sometime, wireless WAN access type, more flexible and convenient, is also provided by some ISP. Wired WAN : In this type, WAN port should be connected by wired cable. This type is the device‟s default option. Wireless WAN : When your ISP provides wireless access service, you can enable this WAN access type.
3-3-3. WAN Connection Mode After you have selected the ISP connection type in “WAN” and you want to modify the related settings, here you can modify and configure the settings in details. 3-3-3-1. Virtual Dial-up (PPPoE) Connection Mode : Show your current connection mode. Account : Enter them provided by your ISP. Password : Enter them provided by your ISP. MTU : Maximum Transmission Unit. It is the size of largest datagram that can be sent over a network. The default value is 1492.
3-4. Home - LAN LAN Settings are for the basic TCP/IP parameters of LAN ports. MAC Address : The Router‟s physical MAC address as seen on your local network, which is unchangeable. IP Address : The Router‟s LAN IP addresses (not your PC‟s IP address). 192.168.0.1 is the default value. Subnet Mask : It‟s shown the Router‟s subnet mask for measurement of the network size. 255.255.255.0 is the default value.
3-5. Home - DNS Settings DNS is short for Domain Name System (or Service), an Internet service that translate domain names into IP addresses which are provided by your Internet Service Provider. Please consult your Internet Service Provider for details if you do not have them. DNS : Click the checkbox to enable the DNS server. The Router‟s DHCP sever will answer the client‟s requests and distribute DNS address. Primary DNS Address : Enter the necessary address provided by your ISP.
3-6. Home - DHCP Server A DHCP (Dynamic Host Control Protocol) is to assign an IP address to the computers on the LAN/private network. When you enable the DHCP Server, the DHCP Server will allocate automatically an unused IP address from the IP address pool to the requesting computer in premise of activating “Obtain an IP Address Automatically”. So specifying the starting and ending address of the IP Address pool is needed. DHCP Server : Activate the checkbox to enable DHCP server.
Chapter IV: Configuration - Wireless 4-1. Wireless - Basic Enable Wireless : Check to enable the Router‟s wireless features; uncheck to disable it. Network Mode : Select one mode from the following. The default is 11b/g/n mode. 11b mode : Allow the wireless client to connect with the device in 11b mode at the maximum speed of 11Mbps. 11g mode : Allow the 11g/11n-compliant client device to connect with the AP at the maximum speed of 54Mbps.
MBSSID AP Isolation : One access control feature based on wireless MAC address. When this feature is enabled, wireless clients connected with the same SSID can not communicate with each other. For example, configure main SSID as AP1, minor SSID as AP2. PC1 and PC2 connect to AP1 via wireless adapter, and configure PC1 and PC2 in the same segment.
4-2. Wireless - Security It is used to configure the AP network‟s security setting. Here presents the encryption methods, including WEP, WPA-personal, WPA-enterprise, WPA2-personal, WPA2- enterprise, etc. 4-2-1. WEP WEP (Wired Equivalent Privacy), a basic encryption method, usually encrypts wireless data using a series of digital keys (64 bits or 128 bits in length).
4-2-2. WPA-PSK (Personal) WPA (Wi-Fi Protected Access), a Wi-Fi standard, is a more recent wireless encryption scheme, designed to improve the security features of WEP. It applies more powerful encryption types (such as TKIP [Temporal Key Integrity Protocol], AES [Advanced Encryption Standard]) or a combination of both and can change the keys dynamically on every authorized wireless device. SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu.
4-2-3. WPA2-PSK (Personal) WPA2 (Wi-Fi Protected Access version 2) provides higher security than WEP (Wireless Equivalent Privacy) and WPA (Wi-Fi Protected Access). SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes. WPA Algorithms : Provides TKIP [Temporal Key Integrity Protocol], AES [Advanced Encryption Standard] or a combination of both.
4-2-4. Mixed WPA-PSK / WPA2-PSK (Personal) Mixed WPA-PSK / WPA2-PSK (Personal) combines the WPA-Personal and WPA-2 Personal security levels. Clients which support WPA2-PSK (Personal) will use WPA2-PSK (Personal), while older clients without this support can use WPA-PSK (Personal). SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes.
4-2-5. WPA (Enterprise) This security mode is used when a RADIUS server is connected to the device. SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes. WPA Algorithms : Provides TKIP [Temporal Key Integrity Protocol], AES [Advanced Encryption Standard] or a combination of both. Key Renewal Interval : Set the key‟s renewal period.
4-2-6. WPA2 (Enterprise) This security mode is based on Radius authentication server and WPA2 encryption method. WPA2 is used when a RADIUS server is connected to the device. SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes. WPA Algorithms : Provides TKIP [Temporal Key Integrity Protocol], AES [Advanced Encryption Standard] or a combination of both.
4-2-7. Mixed WPA / WPA2 (Enterprise) This security mode combines WPA and WPA2 (Enterprise) and is used when a RADIUS server is connected to the device. When the client supports WPA2 (Enterprise), WPA2 (Enterprise) will be used. Older clients will use WPA (Enterprise). SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes.
4-2-8. 802.1x This security mode is used when a RADIUS server is connected to the device. 802.1x, a kind of Port-based authentication protocol, is an authentication type and strategy for users. The port can be either a physic port or logic port (such as VLAN). For wireless LAN users, a port is just a channel. The final purpose of 802.11x authentication is to check if the port can be used. If the port is authenticated successfully, you can open this port which allows all the messages to pass.
4-3. Wireless - Advanced This section is to configure the advanced wireless setting of the Router, including the Radio Preamble, 802.11g/n Rate, Fragmentation Threshold, RTS Threshold, etc. BG protection Mode : Auto by default. It is for 11b/g wireless client to connect 11n wireless network smoothly in a complicated wireless area. Basic Data Rates : For different requirement, you can select one of the suitable Basic Data Rates. Here, default value is (1-2-5.5.-11Mbps…).
4-4. Wireless - WPS WPS (Wi-Fi Protected Setting) can be easy and quick to establish the connection between the wireless network clients and the device through encrypted contents. The users only enter PIN code or press WPS button on the panel to configure it without selecting encryption method and secret keys by manual. WPS settings : To enable or disable WPS function. The default is “disable”. WPS mode : Provide two ways: PBC (Push-Button Configuration) and PIN code.
WPS Encrypt Type : The encryption type used by WPS, generally AES/TKIP. WPS key : The effective key generated by AP automatically. AP PIN(KEY) : The PIN code used by default. Reset OOB : When this button is pressed, the WPS client will be idle state, and WPS indicator will be turned off. AP will not respond the WPS client‟s requests and the set the security mode as WPA mode. 4-5. Wireless - WDS WDS (Wireless Distribution System) is used to expand wireless coverage area.
4-6. Wireless - Access Control To secure your wireless LAN, the wireless access control is actually based on the MAC address management to allow or block the specific clients to access the wireless network. MAC Address Filter : Enable/disable MAC address filter. Select “Close” to malfunction MAC address; “disable” to prevent the MAC addresses in the list from accessing the wireless network; “Allow” to allow the MAC address in the list to access the wireless network.
Chapter V: Configuration - Advanced 5-1. Advanced - Single Port Forwarding Note: In the picture above, you will see an example of some port forwarding rules. The Router can be configured as a virtual server on behalf of local services behind the LAN port. The given remote requests will be re-directed to the local servers via the virtual server. This section deals with the single port forwarding mainly.
Delete/Enable : Click to check it for corresponding operation. Well-Known Service Port : Select the well-known services as DNS, FTP from the drop-down menu to add to the configured one above. Note: If you set the virtual server of the service port as 80, you must set the Web management port on Remote Web Management page to be any value except 80 such as 8080. Otherwise, there will be a conflict to disable the virtual server.
5-2. Advanced - Port Range Forwarding Note: In the picture above, you will see an example of some port forwarding rules. This section deals with the port range forwarding mainly. The Port Range Forwarding allows you to set up a range of public services such as web servers, ftp, e-mail and other specialized Internet applications to an assigned IP address on your LAN. Start/End Port : Enter the start/end port number which ranges the External ports used to set the server or Internet applications.
5-3. Advanced - ALG Service In the context of computer networking, an ALG or application layer gateway consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer applications etc.
5-4. Advanced - DMZ The DMZ function is to allow one computer in LAN to be exposed to the Internet for a special-purpose service as Internet gaming or videoconferencing. DMZ Host IP Address : The IP address of the computer you want to expose. Enable : Click the checkbox to enable the DMZ host. Important: When the DMZ host is enabled, the firewall settings of the DMZ host will not function.
5-5. Advanced - UPNP It supports latest Universal Plug and Play. This function goes into effect on Windows XP or Windows ME or this function would go into effect if you have installed software that supports UPnP. With the UPnP function, host in LAN can request the router to process some special port switching so as to enable host outside to visit the resources in the internal host. Enable UPnP : Click the checkbox to enable the UPnP.
5-6. Advanced - MAC Filters In order to manage the computers in LAN better, you could control the computer‟s access to Internet by MAC Address Filter. MAC Address Filter : Check to enable MAC address filter. Access Policy : Select one number from the drop-down menu. Enable : Check to enable the access policy. Clear the Policy : Click “Clear” button to clear all settings for the policy. Filter Mode : Click one radio button to enable or disable to access the Internet.
5-7. Advanced - URL Filters In order to control the computer to have access to websites, you can use URL filtering to allow the computer to have access to certain websites at fixed time and forbids it having access to certain websites at fixed time. URL Filter : Check to enable URL filter. Access Policy : Select one number from the drop-down menu. Enable : Check to enable the access policy. Clear the Policy : Click “Clear” button to clear all settings for the policy.
5-8. Advanced - Client Filters To benefit your further management to the computers in the LAN, you can control some ports access to Internet by data packet filter function. Client Filter : Check to enable client filter. Access Policy : Select one number from the drop-down menu. Enable : Check to enable the access policy. Clear the Policy : Click “Clear” button to clear all settings for the policy. Filter Mode : Click one radio button to enable or disable to access the Internet.
5-9. Advanced - DDNS The DDNS (Dynamic Domain Name System) is supported in this Router. It is to assign a fixed host and domain name to a dynamic Internet IP address, which is used to monitor hosting website, FTP server and so on behind the Router. If you want to activate this function, please select “Enable” and a DDNS service provider to sign up. Main Features: Owing to ISP most times provides dynamic IP address, DDNS is used to capture the changeable IP address and match the fixed domain.
5-10. Advanced - Prevent Network Attack This section is to protect the internal network from exotic attack such as SYN Flooding attack, Smurf attack, LAND attack, etc. Once detecting the unknown attack, the Router will restrict its bandwidth automatically. The attacker‟s IP address can be found from the “System Log”. Prevent Network Attack : Check to enable it for attack prevention. 5-11. Advanced - WAN Ping The ping test is to check the status of your internet connection.
5-12. Advanced - Traffic Control Traffic control is used to limit communication speed in the LAN and WAN. Up to 20 entries can be supported with the capability for at most 254 PCs' speed control, including for IP address range configuration. Enable Traffic Control : To enable or disable the internal IP bandwidth control. The default is disabled. Interface : To limit the uploading and downloading bandwidth in WAN port. Service : To select the controlled service type, such as HTTP service.
5-13. Advanced - URL Monitor This feature is used to record user‟s Internet activity, so in terms of this feature, the administrator can check out and control what they can do and have done. Enable URL Monitor : After checking this feature, the Router will record LAN computer‟s URL information, including the visiting Website, your LAN IP address and the time. The Router can record up to 500 entries.
5-14. Advanced - Static Routing This page is used to configure the Router‟s static routing. Destination LAN IP : The address of the remote host with which you want to construct a static route. Subnet Mask : The network portion of the Destination LAN IP. Gateway : The gateway of the next hop, usually the Router or host‟s IP address. Notes: 1. The gateway must keep the same segment with the Router‟s LAN IP address. 2.
Chapter VI: Configuration - Tools 6-1. Tools - Admin The “Admin” page exists of 3 sections: Administrator password section Local Web Management section Remote Web Management section Administrator password section: This section is to set a new user name and password to better secure your router and network. User Name : Enter a new user name for the device. Old Password : Enter the old password. New Password : Enter a new password. Re-enter to Confirm : Re-enter to confirm the new password.
Local Web Management section: Local web management, the alternative to remote web management, is to allow the network administrator to manage the Router in LAN. Any PC in the LAN can access the Web management utility by default. So you can enter the specific MAC address of the LAN computer to function. Enable : Check to enable the local web management. MAC1/2/3… : Enter the MAC addresses of LAN computers. Note: 1. In the default state, this feature is not enabled.
6-2. Tools - Time Settings This section is to select the time zone for your location. If you turn off the Router, the settings for time disappear. However, the Router will automatically obtain the GMT time again once it has access to the Internet. Time Zone : Select your time zone from the drop-down menu. Customized time : Enter the time you customize. Note: When the Router is powered off, the time setting will be lost.
6-3. Tools - Backup / Restore The device provides backup/restore settings, so you need set a directory to keep these parameters. Backup Setting: Click “Backup” button to back up the Router‟s settings and select the path for save. Click “Save” to save the configuration files. Restore Setting: Click “Browse” button to select the backup files. Click “Restore” button to restore previous settings. 6-4.
6-5. Tools - Restore to Factory This button is to reset all settings to the default values. It means the Router will lose all the settings you have set. So please Note down the related settings if necessary. Restore : Click this button to restore to default settings. Factory Default Settings: User Name : admin Password : admin IP Address : 192.168.0.1 Subnet Mask : 255.255.255.0 Note: After restoring to default settings, please restart the device, then the default settings can go into effect.
Chapter VII: Configuration - Status 7-1. Status - DHCP Client The Static IP assignment is to add a specifically static IP address to the assigned MAC address. You can view the related information in the DHCP server list. IP Address : Enter the IP address which needs to be bound. MAC Address : Enter the MAC address of the computer you want to assign the above IP address. Click “Add” to add the entry in the list. Hostname : The name of the computer which is added a new IP address.
7-2. Status - Wireless Client This page shows wireless client‟s connection status, including MAC address, Channel bandwidth, etc. MAC Address : Shows current MAC addresses of the hosts connecting to the Router. Bandwidth : Shows current bandwidth of the hosts (wireless client). 7-3. Status - Traffic Statistic Traffic statistics is used to show the LAN PC‟s traffic information. Enable traffic statistics : Check to enable traffic statistics.
7-4. Status - Routing Table The main duty for a router is to look for a best path for every data frame, and transfer this data frame to a destination. So, it‟s essential for the router to choose the best path, i.e. routing arithmetic. In order to finish this function, many transferring paths, i.e. routing table, are saved in the router, for choosing when needed. 7-5. Status - Log The section is to view the system log. Click the “Refresh” to update the log. Click “Clear” to clear all shown information.
Chapter VIII: Appendix 8-1. Troubleshooting If you found the router is working improperly or stop responding to you, don‟t panic! Before you contact your dealer of purchase for help, please read this troubleshooting first. Some problems can be solved by you within very short time! Scenario Solution Router is not responding to a. Please check the connection of power cord and network cable of this router.
I can‟t locate my router by a. „Broadcast ESSID‟ set to off? my wireless client b. All two antennas are properly secured. c. Are you too far from your router? Try to get closer. d. Please remember that you have to input ESSID on your wireless client manually, if ESSID broadcast is disabled. File download is very slow a. Are you using QoS function? Try to disable it and try again. or breaks frequently b. Internet is slow sometimes, being patient. c.
8-2. Glossary Default Gateway (Router): Every non-router IP device needs to configure a default gateway‟s IP address. When the device sends out an IP packet, if the destination is not on the same network, the device has to send the packet to its default gateway, which will then send it out towards the destination. DHCP: Dynamic Host Configuration Protocol. This protocol automatically gives every computer on your home network an IP address.
Port: Network Clients (LAN PC) uses port numbers to distinguish one network application/protocol over another.
8-3. License Agreement Licensing Information This Conceptronic product C150BRS4 includes copyrighted third-party software licensed under the terms of the GNU General Public License. Please see The GNU General Public License for the exact terms and conditions of this license. All used software packages are copyright by their respective authors. Please see the source code for detailed information. Availability of source code Conceptronic.
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 02110-1301 51 Franklin Street, Fifth Floor, Boston, MA USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program.
GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.
a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13.
BSD LICENSE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.